Advertisement

TMSI Allocation Mechanism Using a Secure VLR Authorization in the GSM System

  • Mi-Og Park
  • Dea-Woo Park
  • Sang-Geun Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4217)

Abstract

GSM is the most popular standard for mobile phones in the world. In spite of the tremendous market growth, however, the GSM system has the fatal security problems in TMSI allocation protocol. These problems are right user authentication and location privacy. In this paper, we propose the secure TMSI allocation mechanism using the certification concept to solve these problems. The proposed mechanism provides partial anonymity, which has been rarely provided in the other approaches. Also we propose the modified mechanism to reduce TMSI allocation procedure without changing of the architecture of the original GSM system.

Keywords

Mobile Station User Authentication Mutual Authentication Location Privacy Bandwidth Consumption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
  2. 2.
  3. 3.
    Harn, L., Lin, H.Y.: Modification to enhance the security of the GSM protocol. In: Proceedings of the 5th National Conference on Information security, Taipei, Taiwan, May 1995, pp. 416–420 (1995)Google Scholar
  4. 4.
    Lee, C.C., Hwang, M.S., Yang, W.P.: Extension of authentication protocol for GSM. Proceedings IEE Communications 150(2), 91–95 (2003)CrossRefGoogle Scholar
  5. 5.
    Al-Tawl, K., Akrami, A., Youssef, H.: A new authentication protocol for GSM networks. In: Proceedings of IEEE 23rd Annual Conference on Local computer networks(LCN 1998), pp. 21–30 (1998)Google Scholar
  6. 6.
    Stach, J.F., Park, E.K., Makki, K.: Performance of an enhanced GSM protocol supporting non-repudiayion of service. In: Comput. Commun., pp. 675–680 (1999)Google Scholar
  7. 7.
    Molva, R., Samfat, D., Tsudik, G.: Authentication of mobile users, Network. IEEE 8(2), 26–34 (1994)Google Scholar
  8. 8.
    Cho, Y., Cho, S., Choi, D., Jin, S., Chung, K.I., Park, C.: A Location Privacy Protection Mechanism for Smart Space. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 162–173. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
  10. 10.
  11. 11.
    Chii-Hwa, L., Min-Shiang, H., Wei-Pang, Y.: Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5, 231–243 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mi-Og Park
    • 1
  • Dea-Woo Park
    • 2
  • Sang-Geun Kim
    • 1
  1. 1.Division of Computer EngineeringSungkyul UniversityAnyang-cityKorea
  2. 2.Department of Computer ScienceSoongsil UniversitySeoulKorea

Personalised recommendations